News

Phishing is the attempt to acquire sensitive information, such as: usernames, passwords, and credit card details, often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication. - Wikipedia (https://en.wikipedia.org/wiki/Phishing) At Aviator IT, [...]

A client of ours recently got an email from a security consulting firm that contained the username and password he uses for multiple websites. This email explained that they had found his credentials in an online [...]

(This post is intended for IT professionals.) I know you’re running backups. But with IT resources being thin (or maybe the only real resource being you), you probably don’t have time to check them regularly. [...]

We have seen cloud services become a greater and greater part of our consulting practice over the years, so we know that they appeal to our clients, but we are always curious about why businesses [...]

Let me start by saying that storage high availability is not a feature that every business is going to need in their computing infrastructure. Fault tolerant systems in general are arguably unimportant to businesses that can [...]

I recently read this TechRepublic blog post about how GE is restructuring its IT practices to revitalize American manufacturing. GE's new process is borrowing ideas from agile development and Gemba, among others. One way to [...]

It's essential to research a new technology before implementing it. You need to read the documentation and scan the blogs and forums for gotchas. Then you need to make a plan. But ideally you would [...]